Feeds

Oracle ups Peoplesoft offer to $6.3bn

Playing to win

  • alert
  • submit to reddit

Beginner's guide to SSL certificates

Oracle has upped its hostile offer for Peoplesoft to $19.50 a share. This values its target at $6.3bn, a whopping $1.2bn higher than its opening shot and a premium of 29 per cent higher than Peoplesoft's closing share price on the day before its bid was announced.

According to Peoplesoft, Oracle is simply trying to undermine it with its "atrocious bid", and many analysts seem to buy this argument. We don't: Oracle is playing to win. It is standard tactics in a hostile takeover battle for the bidder to up the ante with an improved offer. Oracle may yet have another bid further down the line.

And if Oracle should fail, its "atrocious" tactics will have secured a better deal for JD Edwards shareholders. Peoplesoft has sweetened its formerly all-share offer for JDE with cash, entirely because of Oracle's predatory action.

But in Anglo Saxon capitalism, publicly quoted companies are either predators or prey. The threat of hostile takeovers keep company boards on their toes. It is astonishing that this is the first entirely hostile bid for a software company in the US (Lotus caved into IBM in days). Such a cosy club is not good for shareholders.

And neither is legal action threatened by Peoplesoft and JDE against Oracle. Let them argue the toss with their shareholders and customers. Oracle's assumption that the enterprise apps world wants suite is shaky. Its plan to migrate the Peoplesoft codebase to Oracle software is audacious, but it's very easy to see the potholes that lie ahead. But if Oracle is prepared and able to stump up enough cash, Peoplesoft shareholders should take the money and run. It's the Oracle shareholders that will pick up the tab, if and when the migration goes West.

Oracle's campaign site is here. ®

Related Stories

PeopleSoft shows J.D. Edwards the money
What does consolidation mean for the customers?
PeopleSoft sues Oracle after all
J.D. Edwards sues Oracle and Ellison
Oracle says 'We're flatter than PeopleSoft'

Remote control for virtualized desktops

More from The Register

next story
NSA SOURCE CODE LEAK: Information slurp tools to appear online
Now you can run your own intelligence agency
Azure TITSUP caused by INFINITE LOOP
Fat fingered geo-block kept Aussies in the dark
Yahoo! blames! MONSTER! email! OUTAGE! on! CUT! CABLE! bungle!
Weekend woe for BT as telco struggles to restore service
Cloud unicorns are extinct so DiData cloud mess was YOUR fault
Applications need to be built to handle TITSUP incidents
BOFH: WHERE did this 'fax-enabled' printer UPGRADE come from?
Don't worry about that cable, it's part of the config
Stop the IoT revolution! We need to figure out packet sizes first
Researchers test 802.15.4 and find we know nuh-think! about large scale sensor network ops
SanDisk vows: We'll have a 16TB SSD WHOPPER by 2016
Flash WORM has a serious use for archived photos and videos
Astro-boffins start opening universe simulation data
Got a supercomputer? Want to simulate a universe? Here you go
Microsoft adds video offering to Office 365. Oh NOES, you'll need Adobe Flash
Lovely presentations... but not on your Flash-hating mobe
prev story

Whitepapers

Driving business with continuous operational intelligence
Introducing an innovative approach offered by ExtraHop for producing continuous operational intelligence.
Why CIOs should rethink endpoint data protection in the age of mobility
Assessing trends in data protection, specifically with respect to mobile devices, BYOD, and remote employees.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Protecting against web application threats using SSL
SSL encryption can protect server‐to‐server communications, client devices, cloud resources, and other endpoints in order to help prevent the risk of data loss and losing customer trust.